{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T20:48:14Z","timestamp":1743022094082,"version":"3.40.3"},"publisher-location":"Cham","reference-count":12,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030627423"},{"type":"electronic","value":"9783030627430"}],"license":[{"start":{"date-parts":[[2020,11,4]],"date-time":"2020-11-04T00:00:00Z","timestamp":1604448000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,11,4]],"date-time":"2020-11-04T00:00:00Z","timestamp":1604448000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-62743-0_96","type":"book-chapter","created":{"date-parts":[[2020,11,3]],"date-time":"2020-11-03T06:02:58Z","timestamp":1604383378000},"page":"670-675","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Data Distributed Storage Scheme in Internet of Things Based on Blockchain"],"prefix":"10.1007","author":[{"given":"Yin","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Jun","family":"Ye","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,11,4]]},"reference":[{"key":"96_CR1","unstructured":"Internet of Things (IoT) connected devices installed base worldwide from 2015 to 2025 (2016). \nhttps:\/\/www.statista.com\/statistics\/471264\/iot-number-of-connected-devices-worldwide\/"},{"key":"96_CR2","doi-asserted-by":"publisher","first-page":"841","DOI":"10.1016\/j.future.2017.08.020","volume":"107","author":"X Li","year":"2020","unstructured":"Li, X., Jiang, P., Chen, T., et al.: A survey on the security of blockchain systems. Future Gener. Comput. Syst. 107, 841\u2013853 (2020)","journal-title":"Future Gener. Comput. Syst."},{"issue":"3","key":"96_CR3","doi-asserted-by":"publisher","first-page":"152","DOI":"10.1007\/s10776-019-00434-x","volume":"26","author":"Y Mo","year":"2019","unstructured":"Mo, Y.: A data security storage method for IoT under Hadoop cloud computing platform. Int. J. Wirel. Inf. Netw. 26(3), 152\u2013157 (2019)","journal-title":"Int. J. Wirel. Inf. Netw."},{"key":"96_CR4","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1016\/j.jnca.2018.12.004","volume":"127","author":"H Tian","year":"2019","unstructured":"Tian, H., Nan, F., Chang, C.C., et al.: Privacy-preserving public auditing for secure data storage in fog-to-cloud computing. J. Netw. Comput. Appl. 127, 59\u201369 (2019)","journal-title":"J. Netw. Comput. Appl."},{"issue":"5","key":"96_CR5","doi-asserted-by":"publisher","first-page":"762","DOI":"10.1109\/TSC.2018.2853167","volume":"12","author":"R Li","year":"2018","unstructured":"Li, R., Song, T., Mei, B., et al.: Blockchain for large-scale Internet of Things data storage and protection. IEEE Trans. Serv. Comput. 12(5), 762\u2013771 (2018)","journal-title":"IEEE Trans. Serv. Comput."},{"issue":"10","key":"96_CR6","doi-asserted-by":"publisher","first-page":"4519","DOI":"10.1109\/TII.2018.2793350","volume":"14","author":"JS Fu","year":"2018","unstructured":"Fu, J.S., Liu, Y., Chao, H.C., et al.: Secure data storage and searching for industrial IoT by integrating fog computing and cloud computing. IEEE Trans. Industr. Inform. 14(10), 4519\u20134528 (2018)","journal-title":"IEEE Trans. Industr. Inform."},{"issue":"4","key":"96_CR7","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1109\/MCC.2018.111122026","volume":"5","author":"W Wang","year":"2018","unstructured":"Wang, W., Xu, P., Yang, L.T.: Secure data collection, storage and access in cloud-assisted IoT. IEEE Cloud Comput. 5(4), 77\u201388 (2018)","journal-title":"IEEE Cloud Comput."},{"issue":"4","key":"96_CR8","doi-asserted-by":"publisher","first-page":"2914","DOI":"10.1109\/JIOT.2020.2963899","volume":"7","author":"S Xiong","year":"2020","unstructured":"Xiong, S., Ni, Q., Wang, L., et al.: SEM-ACSIT: secure and efficient multiauthority access control for IoT cloud storage. IEEE Internet Things J. 7(4), 2914\u20132927 (2020)","journal-title":"IEEE Internet Things J."},{"key":"96_CR9","doi-asserted-by":"publisher","first-page":"567","DOI":"10.1016\/j.ins.2018.02.005","volume":"479","author":"Y Yang","year":"2019","unstructured":"Yang, Y., Zheng, X., Guo, W., et al.: Privacy-preserving smart IoT-based healthcare big data storage and self-adaptive access control system. Inf. Sci. 479, 567\u2013592 (2019)","journal-title":"Inf. Sci."},{"issue":"5","key":"96_CR10","doi-asserted-by":"publisher","first-page":"4049","DOI":"10.1109\/JIOT.2019.2962070","volume":"7","author":"J Xia","year":"2019","unstructured":"Xia, J., Cheng, G., Gu, S., et al.: Secure and trust-oriented edge storage for Internet of Things. IEEE Internet Things J. 7(5), 4049\u20134060 (2019)","journal-title":"IEEE Internet Things J."},{"key":"96_CR11","doi-asserted-by":"crossref","unstructured":"Yannuzzi, M., Milito, R., Serral-Graci\u00e0, R., et al.: Key ingredients in an IoT recipe: Fog Computing, Cloud computing, and more Fog Computing. In: 2014 IEEE 19th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD), pp. 325\u2013329. IEEE (2014)","DOI":"10.1109\/CAMAD.2014.7033259"},{"issue":"11","key":"96_CR12","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A Shamir","year":"1979","unstructured":"Shamir, A.: How to share a secret. Commun. ACM 22(11), 612\u2013613 (1979)","journal-title":"Commun. ACM"}],"container-title":["Advances in Intelligent Systems and Computing","The 2020 International Conference on Machine Learning and Big Data Analytics for IoT Security and Privacy"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-62743-0_96","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,3]],"date-time":"2020-11-03T06:43:53Z","timestamp":1604385833000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-62743-0_96"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,11,4]]},"ISBN":["9783030627423","9783030627430"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-62743-0_96","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2020,11,4]]},"assertion":[{"value":"4 November 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SPIOT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Machine Learning and Big Data Analytics for IoT Security and Privacy","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Shanghai","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 November 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 November 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"spiot2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/spiot2020.com\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}